Phase 3: Execution

  1. After a valid vote is passed, the decision enters a time lock and is under security audit. During this time concerns can be raised, if the change allows for any long-term negative effects for the project or has potential vulnerabilities for malicious intent such as draining of funds.

  2. After the time lock passes and no challenges are unresolved, the decision is implemented in the protocol.

Last updated

© 2024 xHaven All Rights Reserved